Files
CVEs-PoC/2016/CVE-2016-3053.md
T
2025-09-29 21:09:30 +02:00

76 lines
5.3 KiB
Markdown

### [CVE-2016-3053](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3053)
![](https://img.shields.io/static/v1?label=Product&message=AIX&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.2.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=1.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.2.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.2.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.2.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.2.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.1.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.1.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.1.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.1.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.1.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.2.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.2.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.2.1.12%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.3.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.3.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.3.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.3.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.3.3.10%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=430%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.1.0.10%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.1L%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.2%20L%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.2.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.2.0.50%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.2.0.54%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.2.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.3%20L%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.3.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.3.0.10%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.3.0.20%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.3.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.3.8%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.3.9%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.3_ml03%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5L%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.1.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.1.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.1.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Gain%20Privileges&color=brightgreen)
### Description
IBM AIX contains an unspecified vulnerability that would allow a locally authenticated user to obtain root level privileges.
### POC
#### Reference
- https://www.exploit-db.com/exploits/40709/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/H4cksploit/CVEs-master
- https://github.com/RhinoSecurityLabs/CVEs
- https://github.com/merlinepedra/RHINOECURITY-CVEs
- https://github.com/merlinepedra25/RHINOSECURITY-CVEs
- https://github.com/sunzu94/AWS-CVEs